
Research Key Techniques of Data Security in Public Cloud
Author(s) -
Sheik Saidhbi
Publication year - 2019
Publication title -
asian journal of computer science and technology
Language(s) - English
Resource type - Journals
eISSN - 2583-7907
pISSN - 2249-0701
DOI - 10.51983/ajcst-2019.8.2.2143
Subject(s) - cloud computing , cloud computing security , computer security , software deployment , the internet , lease , computer science , order (exchange) , key (lock) , computer security model , internet privacy , business , world wide web , operating system , finance
Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.